eGroup Awarded CRN’s Tech Elite 250 For 13th Year

eGroup | Enabling Technologies Recognized by CRN’s Tech Elite 250 List for 13th Year eGroup | Enabling Technologies Honored on the 2023 CRN’s Tech Elite 250 List “CRN’s Tech Elite 250 list features the leading solution providers in the IT channel with the most in-depth technical knowledge, expertise, and certifications for providing the highest level […]

Copilot Coming to Microsoft 365

Copilot Coming to Microsoft 365 By now you’ve seen the previews of Microsoft’s unique capabilities using large language models within Microsoft 365 Apps like PowerPoint and Excel. Known as Copilot, it’s generating a lot of buzz amongst fans and critics. This blog summarizes some of the more subtle advantages of the technology, timelines of when you […]

How Government Institutions Can Manage Cyber Insurance Increases

How Government Institutions Can Manage Cyber Insurance Increases Growing trends and recent news have shocked the cyber insurance system. With cost and coverage changes, government institutions are simply seeking to attain reasonably affordable cyber insurance. This blog summarizes a spirited debate amongst subject matter experts on the topic in January 2023. Contributors include a former .gov […]

Managed Security Services Improve Security & Your Team’s Value

Managed Security Services Improve Security & Your Team’s Value The Power of MSSPs When I was leading technology organizations, one of the most critical and valuable partner vendor relationships was with our managed security service provider (MSSP). They served in three capacities: Around-the-clock 24/7/365 monitoring for malicious activity, including proactive threat hunting. Served as the […]

eGroup Awarded CRN’s MSP 500 List For 7th Year

eGroup | Enabling Technologies Recognized by CRN’s MSP 500 List for 7th Year eGroup | Enabling Technologies Recognized on CRN’s 2023 MSP 500 List “Managed services offer a path for businesses of all sizes to remain efficient and flexible as they grow. The solution providers on our 2023 MSP 500 list are bringing innovative managed […]

Use Classification Rules (Instead of Proxy Sets) on AudioCodes SBCs

Use Classification Rules (Instead of Proxy Sets) on AudioCodes SBCs Introduction Admittedly, this title is misleading, but it did get you to look at this article! This is part of our series on securing AudioCodes SBCs based on eGroup | Enabling Technologies’ security mantra of “Trust No One, Harden Everything” and guidance provided by AudioCodes. […]

Defuse the Technical Debt Time Bomb

Defuse the Technical Debt Time Bomb While it has certainly been in the news more often lately, technical debt has been a challenge for organizations since the days of vacuum tubes.  Other than the recent air travel examples in the last few months, there is a constant stream of articles about health care providers, colocation […]

The Pros and Cons of Threat Hunting

The Pros and Cons of Threat Hunting Assuming Breach Stealthy supply chain attacks like Solorigate and Log4j have shined a light on the importance of assuming breach. When these attacks hit the news, vendors and analysts often suggest to “hunt for Indicators of Compromise.” IT and security pros spend nights and weekends determining the extent […]

Nonprofit IT Executives Talking Azure

Nonprofit IT Executives Talking Azure In a recent case study about his organization’s journey to the Microsoft cloud, a nonprofit leader stated, “Technology can be the great equalizer.” That evidence was again on display in a recent panel hosted by Microsoft and eGroup | Enabling. Panelists included IT leaders representing four non-profit organizations, with topics ranging […]

Using Regular Expressions to Build a Microsoft Purview Custom Sensitive Information Type

Using Regular Expressions to Build a Microsoft Purview Custom Sensitive Information Type Introduction A colleague of mine needed to create a Microsoft Purview custom Sensitive Information Type (SIT) for a client– The client wanted to use this SIT as part of their implementation of Microsoft Purview. The client needed the SIT to match on occurrences […]